Call Number (LC) Title Results
QA76.9.A25 D78 2010 Epidemics and rumours in complex networks / 1
QA76.9.A25 D78 2010eb Epidemics and Rumours in Complex Networks / 1
QA76.9.A25 D8152 2008eb Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography /
Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography /
2
QA76.9.A25 D83 2009 Eleventh hour security+ exam SYO-201 study guide / 1
QA76.9.A25 .D86 2014 CompTIA security+ (exam SY0-401) / 1
QA76.9.A25 D86 2021 Mike Meyers' CompTIA Security+ Certification Passport (Exam SY0-601) / 1
QA76.9.A25 D87 2008eb Cyber-security and threat politics : US efforts to secure the information age / 2
QA76.9.A25 D87 2022 Cyber security : issues and current trends / 1
QA76.9.A25 E24 2023 Data engineering with AWS : acquire the skills to design and build AWS-based data transformation pipelines like a pro / 1
QA76.9.A25 E26 2013 Economics of information security and privacy III 1
QA76.9.A25E32 2002 Secure XML : the New Syntax for Signatures and Encryption. 1
QA76.9.A25 E325 2011 Computer security fundamentals / 1
QA76.9.A25 E33 2011 Engineering secure software and systems 4th international symposium, ESSoS 2012, Eindhoven, the Netherlands, February, 16-17, 2012 : proceedings / 1
QA76.9.A25 E38 2001 E-commerce security and privacy / 1
QA76.9.A25 E385 2008eb CISO leadership : essential principles for success / 2
QA76.9.A25 E39 2002 Informed watermarking / 1
QA76.9.A25 E398 2017 Guide to pairing-based cryptography / 1
QA76.9.A25 E43 2007eb Embedded Java security security for mobile devices / 1
QA76.9.A25 E43 2009eb Understanding and applying cryptography and data security / 1
QA76.9.A25 E45 2013 Malware, rootkits & botnets : a beginner's guide / 1